Sciweavers

335 search results - page 3 / 67
» Biometrics and Security
Sort
View
137
Voted
MMSEC
2005
ACM
113views Multimedia» more  MMSEC 2005»
15 years 9 months ago
A secure biometric authentication scheme based on robust hashing
In this paper, we propose a secure biometric based authentication scheme which fundamentally relies on the use of a robust hash function. The robust hash function is a one-way tra...
Yagiz Sutcu, Husrev T. Sencar, Nasir D. Memon
66
Voted
HICSS
2008
IEEE
104views Biometrics» more  HICSS 2008»
15 years 10 months ago
The Evolution of the Peer-to-Peer File Sharing Industry and the Security Risks for Users
M. Eric Johnson, Dan McGuire, Nicholas D. Willey
94
Voted
HICSS
2006
IEEE
111views Biometrics» more  HICSS 2006»
15 years 9 months ago
Physical Security and Vulnerability Modeling for Infrastructure Facilities
Dean A. Jones, Chad E. Davis, Mark A. Turnquist, L...
73
Voted
HICSS
2010
IEEE
114views Biometrics» more  HICSS 2010»
15 years 5 months ago
Measuring Similarity for Security Vulnerabilities
Ju An Wang, Linfeng Zhou, Minzhe Guo, Hao Wang, Ja...
151
Voted
SP
1998
IEEE
174views Security Privacy» more  SP 1998»
15 years 8 months ago
On Enabling Secure Applications Through Off-Line Biometric Identification
In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, we study secure off-line...
George I. Davida, Yair Frankel, Brian J. Matt